• 제목/요약/키워드: computer-based

검색결과 33,638건 처리시간 0.052초

3차원 의학영상을 이용한 원격회의시스템 (Teleconference System based on 3D Medical Image)

  • 박주영;남상아;최수미;홍헬렌;유현선;임지영;김종원;김명희
    • 대한의용생체공학회:학술대회논문집
    • /
    • 대한의용생체공학회 1996년도 춘계학술대회
    • /
    • pp.147-150
    • /
    • 1996
  • We are developing a teleconference system based on 3D medical image. The system consists in three sub-systems : conference operating system, medical image processing system and database management system. It makes it possible efficient computer-supported coorperative work among remote multi-located hospitals. In this paper, we present functions of each subsystem that have implemented until now.

  • PDF

Object Detection Using Deep Learning Algorithm CNN

  • S. Sumahasan;Udaya Kumar Addanki;Navya Irlapati;Amulya Jonnala
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.129-134
    • /
    • 2024
  • Object Detection is an emerging technology in the field of Computer Vision and Image Processing that deals with detecting objects of a particular class in digital images. It has considered being one of the complicated and challenging tasks in computer vision. Earlier several machine learning-based approaches like SIFT (Scale-invariant feature transform) and HOG (Histogram of oriented gradients) are widely used to classify objects in an image. These approaches use the Support vector machine for classification. The biggest challenges with these approaches are that they are computationally intensive for use in real-time applications, and these methods do not work well with massive datasets. To overcome these challenges, we implemented a Deep Learning based approach Convolutional Neural Network (CNN) in this paper. The Proposed approach provides accurate results in detecting objects in an image by the area of object highlighted in a Bounding Box along with its accuracy.

사실적인 포인트 기반 렌더링을 위한 서브서피스 스캐터링 방법 (Subsurface Scattering for Realistic Point-based Rendering)

  • 김현중;최수미
    • 한국컴퓨터그래픽스학회논문지
    • /
    • 제18권1호
    • /
    • pp.11-21
    • /
    • 2012
  • 포인트 기반 렌더링은 그 과정이 간단하고 유연하기 때문에 폴리곤 기반 렌더링의 대안으로 주목을 받고 있다. 하지만 기존의 포인트 기반 렌더링 방법들은 사람의 피부와 같은 반투명 물체를 사실적으로 표현하기에는 충분하지 않다. 본 논문에서는 부드럽고 반투명한 피부 외관을 생성하는데 중요한 현상인 서브서피스 스캐터링을 표현할 수 있는 포인트 기반 렌더링 프레임워크를 제안한다. 피부처럼 다층으로 이루어진 물체에서의 서브서피스 스캐터링을 정확하게 시뮬레이션 하기 위해서, 본 논문에서는 다수의 가우시안 기저함수들을 일차 결합하여 오브젝트 공간상의 스플랫에 적용하는 스플랫 기반의 확산 방법을 개발하였다. 개발된 방법으로 여러 사람의 얼굴들을 렌더링하였을 때, 기존의 포인트 기반 방법들보다 시각적인 품질에서 훨씬 향상된 결과를 보였다.

Brainwave-based Mood Classification Using Regularized Common Spatial Pattern Filter

  • Shin, Saim;Jang, Sei-Jin;Lee, Donghyun;Park, Unsang;Kim, Ji-Hwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.807-824
    • /
    • 2016
  • In this paper, a method of mood classification based on user brainwaves is proposed for real-time application in commercial services. Unlike conventional mood analyzing systems, the proposed method focuses on classifying real-time user moods by analyzing the user's brainwaves. Applying brainwave-related research in commercial services requires two elements - robust performance and comfortable fit of. This paper proposes a filter based on Regularized Common Spatial Patterns (RCSP) and presents its use in the implementation of mood classification for a music service via a wireless consumer electroencephalography (EEG) device that has only 14 pins. Despite the use of fewer pins, the proposed system demonstrates approximately 10% point higher accuracy in mood classification, using the same dataset, compared to one of the best EEG-based mood-classification systems using a skullcap with 32 pins (EU FP7 PetaMedia project). This paper confirms the commercial viability of brainwave-based mood-classification technology. To analyze the improvements of the system, the changes of feature variations after applying RCSP filters and performance variations between users are also investigated. Furthermore, as a prototype service, this paper introduces a mood-based music list management system called MyMusicShuffler based on the proposed mood-classification method.

A pairing-free key-insulated certificate-based signature scheme with provable security

  • Xiong, Hu;Wu, Shikun;Geng, Ji;Ahene, Emmanuel;Wu, Songyang;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1246-1259
    • /
    • 2015
  • Certificate-based signature (CBS) combines the advantages of both public key-based signature and identity-based signature, while saving from the disadvantages of drawbacks in both PKS and IBS. The insecure deployment of CBS under the hostile circumstances usually causes the exposure of signing key to be inescapable. To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS. Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices. Furthermore, the unforgeability of our scheme has been formally proven to rest on the discrete logarithm assumption in the random oracle model.

Using Immersive Augmented Reality to Assess the Effectiveness of Construction Safety Training

  • Kim, Kyungki;Alshair, Mohammed;Holtkamp, Brian;Yun, Chang;Khalafi, SeyedAmirhesam;Song, Lingguang;Suh, Min Jae
    • Journal of Construction Engineering and Project Management
    • /
    • 제9권4호
    • /
    • pp.16-33
    • /
    • 2019
  • The increasing size and complexity of modern construction projects demands mature capabilities of onsite personnel with regard to recognizing unsafe situations. Construction safety training is paper or computer-based and suffers from a distinct gap between the classroom training environment and real-world construction sites; even trained personnel can find it difficult to recognize many of the potential safety hazards at their jobsites even after receiving construction safety training. Immersive technologies can overcome the current limitations in construction safety training by reducing the gap between the classroom and a real construction environment. This research developed and tested a new Augmented Reality (AR)-based assessment tool to evaluate the hazard recognition skills of students majoring in construction management as part of a construction safety course. The quantitative and qualitative results of this research confirmed that AR-based assessment can become a very effective assessment tool to evaluate safety knowledge and skills in a construction safety course, outperforming both paper and computer-based assessment methods. The students preferred AR-based assessment because it provides a realistic visual context for real world safety hazards.

A Decision Tree based Real-time Hand Gesture Recognition Method using Kinect

  • Chang, Guochao;Park, Jaewan;Oh, Chimin;Lee, Chilwoo
    • 한국멀티미디어학회논문지
    • /
    • 제16권12호
    • /
    • pp.1393-1402
    • /
    • 2013
  • Hand gesture is one of the most popular communication methods in everyday life. In human-computer interaction applications, hand gesture recognition provides a natural way of communication between humans and computers. There are mainly two methods of hand gesture recognition: glove-based method and vision-based method. In this paper, we propose a vision-based hand gesture recognition method using Kinect. By using the depth information is efficient and robust to achieve the hand detection process. The finger labeling makes the system achieve pose classification according to the finger name and the relationship between each fingers. It also make the classification more effective and accutate. Two kinds of gesture sets can be recognized by our system. According to the experiment, the average accuracy of American Sign Language(ASL) number gesture set is 94.33%, and that of general gestures set is 95.01%. Since our system runs in real-time and has a high recognition rate, we can embed it into various applications.

A Novel Multifocus Image Fusion Algorithm Based on Nonsubsampled Contourlet Transform

  • Liu, Cuiyin;Cheng, Peng;Chen, Shu-Qing;Wang, Cuiwei;Xiang, Fenghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.539-557
    • /
    • 2013
  • A novel multifocus image fusion algorithm based on NSCT is proposed in this paper. In order to not only attain the image focusing properties and more visual information in the fused image, but also sensitive to the human visual perception, a local multidirection variance (LEOV) fusion rule is proposed for lowpass subband coefficient. In order to introduce more visual saliency, a modified local contrast is defined. In addition, according to the feature of distribution of highpass subband coefficients, a direction vector is proposed to constrain the modified local contrast and construct the new fusion rule for highpass subband coefficients selection The NSCT is a flexible multiscale, multidirection, and shift-invariant tool for image decomposition, which can be implemented via the atrous algorithm. The proposed fusion algorithm based on NSCT not only can prevent artifacts and erroneous from introducing into the fused image, but also can eliminate 'block effect' and 'frequency aliasing' phenomenon. Experimental results show that the proposed method achieved better fusion results than wavelet-based and CT-based fusion method in contrast and clarity.

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP

  • Guo, Weipeng;Chen, Yonghong;Cai, Yiqiao;Wang, Tian;Tian, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5574-5591
    • /
    • 2017
  • Inspired by the idea of Artificial Immune System, many researches of wireless sensor network (WSN) intrusion detection is based on the artificial intelligent system (AIS). However, a large number of generated detectors, black hole, overlap problem of NSA have impeded further used in WSN. In order to improve the anomaly detection performance for WSN, detector generation mechanism need to be improved. Therefore, in this paper, a Differential Evolution Constraint Multi-objective Optimization Problem based Negative Selection Algorithm (DE-CMOP based NSA) is proposed to optimize the distribution and effectiveness of the detector. By combining the constraint handling and multi-objective optimization technique, the algorithm is able to generate the detector set with maximized coverage of non-self space and minimized overlap among detectors. By employing differential evolution, the algorithm can reduce the black hole effectively. The experiment results show that our proposed scheme provides improved NSA algorithm in-terms, the detectors generated by the DE-CMOP based NSA more uniform with less overlap and minimum black hole, thus effectively improves the intrusion detection performance. At the same time, the new algorithm reduces the number of detectors which reduces the complexity of detection phase. Thus, this makes it suitable for intrusion detection in WSN.

Certificate-Based Encryption Scheme without Pairing

  • Yao, Ji;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권6호
    • /
    • pp.1480-1491
    • /
    • 2013
  • Certificate-based cryptography is a new cryptographic primitive which eliminates the necessity of certificates in the traditional public key cryptography and simultaneously overcomes the inherent key escrow problem suffered in identity-based cryptography. However, to the best of our knowledge, all existed constructions of certificate-based encryption so far have to be based on the bilinear pairings. The pairing calculation is perceived to be expensive compared with normal operations such as modular exponentiations in finite fields. The costly pairing computation prevents it from wide application, especially for the computation limited wireless sensor networks. In order to improve efficiency, we propose a new certificate-based encryption scheme that does not depend on the pairing computation. Based on the decision Diffie-Hellman problem assumption, the scheme's security is proved to be against the chosen ciphertext attack in the random oracle. Performance comparisons show that our scheme outperforms the existing schemes.